You are not logged in.

#1 2008-02-10 21:43:07

andre.ramaciotti
Member
From: Brazil
Registered: 2007-04-06
Posts: 649

Linux Kernel 2.6 Local Root Exploit

aquatix writes
"This local root exploit (Debian, Ubuntu) seems to work everywhere I try it, as long as it's a Linux kernel version 2.6.17 to 2.6.24.1. If you don't trust your users (which you shouldn't), better compile a new kernel without vmsplice."
Here is millw0rm's proof-of-concept code.

http://it.slashdot.org/article.pl?sid=08/02/10/2011257


(lambda ())

Offline

#2 2008-02-10 22:02:03

ise
Developer
From: Karlsruhe / Germany
Registered: 2005-10-06
Posts: 404
Website

Re: Linux Kernel 2.6 Local Root Exploit

It is fixed in the latest kernel package "kernel26-2.6.24.1-2" in [core]. wink

Offline

#3 2008-02-10 22:02:43

ConnorBehan
Package Maintainer (PM)
From: Long Island NY
Registered: 2007-07-05
Posts: 1,359
Website

Re: Linux Kernel 2.6 Local Root Exploit

Wow that really works. Luckily there is already a patch out for it. http://git.kernel.org/?p=linux/kernel/g … 04f49cbc44


6EA3 F3F3 B908 2632 A9CB E931 D53A 0445 B47A 0DAB
Great things come in tar.xz packages.

Offline

#4 2008-02-11 01:13:39

andre.ramaciotti
Member
From: Brazil
Registered: 2007-04-06
Posts: 649

Re: Linux Kernel 2.6 Local Root Exploit

@ ise
Fine then. smile I was just reporting so that at least the new one woud come without vmsplite.


(lambda ())

Offline

#5 2008-02-11 01:22:41

toofishes
Developer
From: Chicago, IL
Registered: 2006-06-06
Posts: 602
Website

Re: Linux Kernel 2.6 Local Root Exploit

Yeah, we heard about this yesterday and worked to fix it, including submitting things upstream. kernel26-2.6.24.1-2 is no longer vulnerable, although I can verify that 2.6.24.1-1 and any earlier kernel definitely was (ran the code locally myself, and broke some other things too...).

Keep in mind that Arch doesn't do any security releases of packages for this kind of thing, so if you are running an old kernel, you should watch out because we can't update those for you.

Word of advice- don't try this exploit over SSH.

Offline

#6 2008-02-11 02:42:01

ConnorBehan
Package Maintainer (PM)
From: Long Island NY
Registered: 2007-07-05
Posts: 1,359
Website

Re: Linux Kernel 2.6 Local Root Exploit

toofishes wrote:

Keep in mind that Arch doesn't do any security releases of packages for this kind of thing, so if you are running an old kernel, you should watch out because we can't update those for you.

What do you mean?... it is updated. When I heard about this I did a pacman -Syu and sure enough kernel26-2.6.24.1-2 came up (although I just checked a few other mirrors, and not all of them are as up to date).


6EA3 F3F3 B908 2632 A9CB E931 D53A 0445 B47A 0DAB
Great things come in tar.xz packages.

Offline

#7 2008-02-11 05:56:24

B-Con
Member
From: USA
Registered: 2007-12-17
Posts: 554
Website

Re: Linux Kernel 2.6 Local Root Exploit

toofishes wrote:

Word of advice- don't try this exploit over SSH.

How come? Does it not work (as) well if compiled and executed remotely?

Offline

#8 2008-02-11 06:10:39

peets
Member
From: Montreal
Registered: 2007-01-11
Posts: 936
Website

Re: Linux Kernel 2.6 Local Root Exploit

Behold the power of open source software (and its community of users/hackers).

Offline

#9 2008-02-11 07:18:30

jolinfire
Member
From: France
Registered: 2007-12-21
Posts: 176

Re: Linux Kernel 2.6 Local Root Exploit

As I am using testing, I got it a few hours ago wink

/me loves arch and will stay with it for a long time wink

Offline

#10 2008-02-11 08:16:27

z0phi3l
Member
From: Waterbury CT
Registered: 2007-11-26
Posts: 278

Re: Linux Kernel 2.6 Local Root Exploit

ConnorBehan wrote:
toofishes wrote:

Keep in mind that Arch doesn't do any security releases of packages for this kind of thing, so if you are running an old kernel, you should watch out because we can't update those for you.

What do you mean?... it is updated. When I heard about this I did a pacman -Syu and sure enough kernel26-2.6.24.1-2 came up (although I just checked a few other mirrors, and not all of them are as up to date).

Some people don't run pacman -Syu very often and therefore would still have an unpatched kernel, some update but for various reasons choose to use an older kernel, those older kernels won't be patched by an Arch Dev

Offline

#11 2008-02-11 08:34:12

zyghom
Member
From: Poland/currently Africa
Registered: 2006-05-11
Posts: 432
Website

Re: Linux Kernel 2.6 Local Root Exploit

toofishes wrote:

Yeah, we heard about this yesterday and worked to fix it, including submitting things upstream. kernel26-2.6.24.1-2 is no longer vulnerable, although I can verify that 2.6.24.1-1 and any earlier kernel definitely was (ran the code locally myself, and broke some other things too...).

Keep in mind that Arch doesn't do any security releases of packages for this kind of thing, so if you are running an old kernel, you should watch out because we can't update those for you.

Word of advice- don't try this exploit over SSH.

mine is not vulnerable:

22:21:38 papio@baboon:/home/tmp$ uname -a
Linux baboon 2.6.24-ARCH #1 SMP PREEMPT Fri Feb 8 21:39:17 UTC 2008 i686 Intel(R) Core(TM)2 Duo CPU T7500 @ 2.20GHz GenuineIntel GNU/Linux
22:21:43 papio@baboon:/home/tmp$ ./a.out
———————————–
Linux vmsplice Local Root Exploit
By qaaz
———————————–
[+] addr: 0xc0120740
[-] wtf
22:21:44 papio@baboon:/home/tmp$ whoami
papio

10:30:02 papio@baboon:~$ paqi kernel26
Name           : kernel26
Version        : 2.6.24.1-1
URL            : http://www.kernel.org
Licenses       : GPL2 
Groups         : base 
Provides       : None
Depends On     : coreutils  module-init-tools  mkinitcpio>=0.5.15 
Optional Deps  : None
Required By    : nvidia  nvidia  rt2500  rt2500  truecrypt  virtualbox-modules  wlan-ng26  wlan-ng26 
Conflicts With : None
Replaces       : None
Installed Size : 65773.50 K
Packager       : Tobias Powalowski <tpowa@archlinux.org>
Architecture   : i686
Build Date     : Fri 08 Feb 2008 11:41:39 PM EET
Install Date   : Sat 09 Feb 2008 08:27:18 AM EET
Install Reason : Explicitly installed
Install Script : Yes
Description    : The Linux Kernel and modules

Last edited by zyghom (2008-02-11 08:34:30)


Zygfryd Homonto

Offline

#12 2008-02-11 08:43:42

shining
Pacman Developer
Registered: 2006-05-10
Posts: 2,043

Re: Linux Kernel 2.6 Local Root Exploit

zyghom wrote:
toofishes wrote:

Yeah, we heard about this yesterday and worked to fix it, including submitting things upstream. kernel26-2.6.24.1-2 is no longer vulnerable, although I can verify that 2.6.24.1-1 and any earlier kernel definitely was (ran the code locally myself, and broke some other things too...).

Keep in mind that Arch doesn't do any security releases of packages for this kind of thing, so if you are running an old kernel, you should watch out because we can't update those for you.

Word of advice- don't try this exploit over SSH.

mine is not vulnerable:

Are you sure you tried 5092 and not 5093 on milworm?


pacman roulette : pacman -S $(pacman -Slq | LANG=C sort -R | head -n $((RANDOM % 10)))

Offline

#13 2008-02-11 08:44:25

shining
Pacman Developer
Registered: 2006-05-10
Posts: 2,043

Re: Linux Kernel 2.6 Local Root Exploit

B-Con wrote:
toofishes wrote:

Word of advice- don't try this exploit over SSH.

How come? Does it not work (as) well if compiled and executed remotely?

Because it might mess up ssh.


pacman roulette : pacman -S $(pacman -Slq | LANG=C sort -R | head -n $((RANDOM % 10)))

Offline

#14 2008-02-11 08:49:40

Basn
Member
From: Stockholm
Registered: 2007-08-13
Posts: 47

Re: Linux Kernel 2.6 Local Root Exploit

zyghom wrote:
toofishes wrote:

Yeah, we heard about this yesterday and worked to fix it, including submitting things upstream. kernel26-2.6.24.1-2 is no longer vulnerable, although I can verify that 2.6.24.1-1 and any earlier kernel definitely was (ran the code locally myself, and broke some other things too...).

Keep in mind that Arch doesn't do any security releases of packages for this kind of thing, so if you are running an old kernel, you should watch out because we can't update those for you.

Word of advice- don't try this exploit over SSH.

mine is not vulnerable:

22:21:38 papio@baboon:/home/tmp$ uname -a
Linux baboon 2.6.24-ARCH #1 SMP PREEMPT Fri Feb 8 21:39:17 UTC 2008 i686 Intel(R) Core(TM)2 Duo CPU T7500 @ 2.20GHz GenuineIntel GNU/Linux
22:21:43 papio@baboon:/home/tmp$ ./a.out
———————————–
Linux vmsplice Local Root Exploit
By qaaz
———————————–
[+] addr: 0xc0120740
[-] wtf
22:21:44 papio@baboon:/home/tmp$ whoami
papio

10:30:02 papio@baboon:~$ paqi kernel26
Name           : kernel26
Version        : 2.6.24.1-1
URL            : http://www.kernel.org
Licenses       : GPL2 
Groups         : base 
Provides       : None
Depends On     : coreutils  module-init-tools  mkinitcpio>=0.5.15 
Optional Deps  : None
Required By    : nvidia  nvidia  rt2500  rt2500  truecrypt  virtualbox-modules  wlan-ng26  wlan-ng26 
Conflicts With : None
Replaces       : None
Installed Size : 65773.50 K
Packager       : Tobias Powalowski <tpowa@archlinux.org>
Architecture   : i686
Build Date     : Fri 08 Feb 2008 11:41:39 PM EET
Install Date   : Sat 09 Feb 2008 08:27:18 AM EET
Install Reason : Explicitly installed
Install Script : Yes
Description    : The Linux Kernel and modules

Sometimes you have to run it more than once i think.

Offline

#15 2008-02-11 12:17:04

[knap]
Member
Registered: 2007-12-29
Posts: 37

Re: Linux Kernel 2.6 Local Root Exploit

It worked with 2.6.23 but doesn't work now with the new kernel. Good work guys.

This still isn't fixed in Ubuntu (7.10).

Offline

#16 2008-02-11 20:30:11

ConnorBehan
Package Maintainer (PM)
From: Long Island NY
Registered: 2007-07-05
Posts: 1,359
Website

Re: Linux Kernel 2.6 Local Root Exploit

z0phi3l wrote:
ConnorBehan wrote:
toofishes wrote:

Keep in mind that Arch doesn't do any security releases of packages for this kind of thing, so if you are running an old kernel, you should watch out because we can't update those for you.

What do you mean?... it is updated. When I heard about this I did a pacman -Syu and sure enough kernel26-2.6.24.1-2 came up (although I just checked a few other mirrors, and not all of them are as up to date).

Some people don't run pacman -Syu very often and therefore would still have an unpatched kernel, some update but for various reasons choose to use an older kernel, those older kernels won't be patched by an Arch Dev

Oh so they won't release 2.6.23-fixed, 2.6.22-fixed, etc. Well that's typical of a rolling release distro.


6EA3 F3F3 B908 2632 A9CB E931 D53A 0445 B47A 0DAB
Great things come in tar.xz packages.

Offline

Board footer

Powered by FluxBB